Not really.
Any config tool does need to actually configure the box, however Tower has role based access control that you can use to restrict *WHO* can configure the box.
Further, you can also control access to your source control so only certain people should have access to your playbooks.
You can allow some users you don't trust to deploy into test/stage environments, and only allow ops team members you trust to deploy into prod.
And that exists with every single configuration tool on the planet -- needing to be able to configure the system -- and is not a SSH key specific kind of thing.